Neustar International Security Council (NISC) research revealed yesterday that system compromises are now the greatest cyber concern for IT security leaders, with nearly one in four (23%) security leaders citing them as the biggest threat to their business. Jason Garbis, VP at Cyxtera Technologies commented below.
“The traditional network perimeter as we knew it no longer exists, so relying solely on it is a doomed security strategy. IT is more distributed and diverse than ever. Organizations must change their entire security infrastructure and mindset to protect against evolving and aggressive cyber threats. This requires a shift from a hardware-centric security model to a software-defined one. People should be at the center of security, with an identity-centric model that starts with a user, not an IP address. Verify who the user is, not just what wire they came in on, before granting access to applications and systems. Software-defined perimeter (SDP) software solutions provide a giant leap forward in that direction because users only get access to network resources they need, after they’ve been authenticated. Unauthorized resources aren’t just blocked at the network port – they’re completely invisible. This vastly reduces the attack surface area.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.